会議情報
ISC 2025: Information Security Conference
会議のウェブサイトを表示するにはログインしてください
提出日: |
2025-06-04 |
通知日: |
2025-07-29 |
会議日: |
2025-10-20 |
場所: |
Seoul, South Korea |
年: |
28 |
CCF: c CORE: b QUALIS: a2 閲覧: 66421 追跡: 106 出席: 13
論文募集
The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high quality papers in all technical aspects of information security.
This includes submissions from academia, industry and government on traditional as well as emerging topics and new paradigms in these areas, with a clear connection to real-world problems, systems, or applications.
Types of Submissions Solicited
Papers on all technical aspects of information security, cryptography, and privacy are solicited for submission. Areas of interest include, but are not limited to:
access control
formal methods
post-quantum cryptography
anonymity
foundations
privacy
applied cryptography
functional encryption
privacy-enhancing technologies
attribute-based cryptography
hardness assumptions
protocols
automated security analysis
homomorphic encryption
public-key cryptography
biometric security
identity-based cryptography
real-world cryptography
blockchain
identity management
secure messaging
certification
implementations
secure voting
cloud computing
indistinguishability obfuscation
security proofs
containerization
Internet security
side-channel attacks
critical infrastructures
intrusion detection
software security
cryptanalysis
key management
standardization
cryptocurrency
malware
symmetric-key cryptography
cybercrime
mathematical aspects
threshold cryptography
database/system security
micro-architectural attacks
trusted execution
decentralized systems
mobile/wireless/5G security
unlinkability
downgrade attacks
multilinear maps
usability
embedded platforms
multi-party computation
vulnerabilities
fault attacks
networks security
web security
fingerprinting
OS and systems security
zero-knowledge proofs
This includes submissions from academia, industry and government on traditional as well as emerging topics and new paradigms in these areas, with a clear connection to real-world problems, systems, or applications.
Types of Submissions Solicited
Papers on all technical aspects of information security, cryptography, and privacy are solicited for submission. Areas of interest include, but are not limited to:
access control
formal methods
post-quantum cryptography
anonymity
foundations
privacy
applied cryptography
functional encryption
privacy-enhancing technologies
attribute-based cryptography
hardness assumptions
protocols
automated security analysis
homomorphic encryption
public-key cryptography
biometric security
identity-based cryptography
real-world cryptography
blockchain
identity management
secure messaging
certification
implementations
secure voting
cloud computing
indistinguishability obfuscation
security proofs
containerization
Internet security
side-channel attacks
critical infrastructures
intrusion detection
software security
cryptanalysis
key management
standardization
cryptocurrency
malware
symmetric-key cryptography
cybercrime
mathematical aspects
threshold cryptography
database/system security
micro-architectural attacks
trusted execution
decentralized systems
mobile/wireless/5G security
unlinkability
downgrade attacks
multilinear maps
usability
embedded platforms
multi-party computation
vulnerabilities
fault attacks
networks security
web security
fingerprinting
OS and systems security
zero-knowledge proofs
最終更新 Dou Sun 2025-05-26
合格率
| 時間 | 提出 | 受け入れ | 受け入れ(%) |
|---|---|---|---|
| 2014 | 106 | 36 | 34% |
| 2013 | 70 | 30 | 42.9% |
| 2012 | 72 | 23 | 31.9% |
| 2011 | 95 | 25 | 26.3% |
| 2010 | 117 | 36 | 30.8% |
| 2009 | 105 | 38 | 36.2% |
| 2008 | 134 | 33 | 24.6% |
| 2007 | 116 | 28 | 24.1% |
| 2006 | 188 | 38 | 20.2% |
| 2005 | 271 | 38 | 14% |
関連会議
| CCF | CORE | QUALIS | 省略名 | 完全な名前 | 提出日 | 通知日 | 会議日 |
|---|---|---|---|---|---|---|---|
| b | b3 | ICISS | International Conference on Information Systems Security | 2026-07-10 | 2026-09-10 | 2026-12-16 | |
| c | INSCRYPT | International Conference on Information Security and Cryptology | 2025-06-15 | 2025-08-01 | 2025-10-19 | ||
| c | b | a2 | ISC | Information Security Conference | 2025-06-04 | 2025-07-29 | 2025-10-20 |
| c | b | b1 | ICICS | International Conference on Information and Communications Security | 2025-05-23 | 2025-07-21 | 2025-10-29 |
| c | b1 | FUSION | International Conference on Information Fusion | 2024-03-01 | 2024-05-01 | 2024-07-07 | |
| b | b1 | ISIT | International Symposium on Information Theory | 2019-01-20 | 2019-03-31 | 2019-07-07 | |
| c | ISA' | International Conference on Information Security and Assurance | 2016-01-30 | 2016-02-15 | 2016-03-24 | ||
| c | IAS | International Conference on Information Assurance and Security | 2015-10-21 | 2015-11-10 | 2015-12-07 | ||
| b | ICISC | International Conference on Information Security and Cryptology | 2015-09-07 | 2015-10-19 | 2015-11-25 | ||
| b | ITW | Information Theory Workshop | 2013-07-12 | 2013-09-09 |
関連仕訳帳
| CCF | 完全な名前 | インパクト ・ ファクター | 出版社 | ISSN |
|---|---|---|---|---|
| a | IEEE Transactions on Information Forensics and Security | 8.0 | IEEE | 1556-6013 |
| c | Journal of Information Security and Applications | 3.7 | Elsevier | 2214-2126 |
| International Journal of Information Security | 3.2 | Springer | 1615-5262 | |
| The Information Society | 3.0 | Taylor & Francis | 0197-2243 | |
| a | IEEE Transactions on Information Theory | 2.9 | IEEE | 0018-9448 |
| c | EURASIP Journal on Information Security | 2.1 | Springer | 1687-417X |
| Information Polity | 1.8 | IOS Press | 1570-1255 | |
| Journal of Information Science | 1.7 | SAGE | 0165-5515 | |
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| c | International Journal of Information Security and Privacy | 0.800 | Idea Group Inc | 1930-1650 |